Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Title page
Acknowledgments
Windows Server 2016: Domain Infrastructure
Table of Contents
Who Is This Book For?
How Is This Book Organized?
How to Stay in Touch?
Establishing Account Policies
Enforcing Password Policy
Configuring Account Lockout Policy
Setting Kerberos Policy
Using Authentication Policies
Creating Password Settings Objects
Granting Capabilities, Privileges, and Rights
Assigning User Rights
Assigning User Rights for a Domain or OU
Assigning User Rights on a Specific Computer
Creating and Configuring Domain User Accounts
Configuring Account Options
Configuring Profile Options
Determining Effective Access
Troubleshooting User Accounts
Working with Managed Service Accounts
Managed Service Account Fundamentals
Creating Group Managed Service Accounts
Step 1: Create a Hosting Group
Step 2: Create a KMS Root Key
Step 3: Create the gMSA
Step 4: Install the Account
Step 5: Configure Service to use gMSA
Deleting Managed Service Accounts
Resetting the Account Password
Moving Managed Service Accounts
Using Virtual Accounts
Maintaining User Accounts
Resetting Passwords
Disabling and Enabling User Accounts
Unlocking User Accounts
Renaming User Accounts
Moving User Accounts
Deleting User Accounts
Recovering Deleted Accounts
Enabling Active Directory Recycle Bin
Recovering Accounts from the Recycle Bin
Working with Groups
Creating Groups
Modifying Groups
Adding Members to Groups
Searching for Groups in the Directory
Deleting Groups
Managing Computer Accounts
Creating Computer Accounts in Active Directory
Joining Computers to a Domain
Performing an Offline Domain Join
Moving Computer Accounts
Disabling Computer Accounts
Resetting Computer Accounts
Deleting Computer Accounts
Troubleshooting Computer Accounts
Active Directory Physical Architecture
A Top-Level View
A View within the Local Security Authority
Decoding the Directory Service Architecture
Navigating Protocols and Client Interfaces
Understanding the Directory Service Component
Understanding the Extensible Storage Engine
Deletion without Recycle Bin
Deletion with Recycle Bin
Data Store Architecture
Active Directory Logical Architecture
Understanding Objects
Navigating Domains, Trees, and Forests
Introducing Trusts
Introducing Namespaces and Partitions
Understanding Replication
Planning for Replication
Planning for Search and Global Catalogs
Searching the Directory
Accessing the Global Catalog
Designating Global Catalog Servers
Designating Replication Attributes
Planning for Compatibility
Understanding Domain Functional Levels
Understanding Forest Functional Levels
Managing Functional Levels
Authentication Essentials for Groups
Security Tokens and Membership Caching
User Principal Names
Enabling Membership Caching
Navigating Authentication Options
Understanding NTLM
Understanding Kerberos
Accessing Resources After Authentication
Understanding Domain Trusts
Two-Way Transitive Trusts
Shortcut Trusts
Understanding Forest Trusts
Identifying Existing Trusts
Establishing Trusts
Verifying and Troubleshooting Trusts
Delegating Authentication
Understanding Delegated Authentication
Implementing Delegated Authentication
Creating an Implementation or Update Plan
Developing a Forest Plan
Selecting the Forest Namespace
Building a Single Forest vs. Multiple Forests
Understanding Forest Administration
Developing a Domain Plan
Creating a Domain Design
Using a Single Domain vs. Multiple Domains
Establishing the Forest Root Domain
Changing Domain Design
Preinstallation Considerations for Active Directory
Selecting Your Hardware
Configuring Active Directory for Fast Recovery
Connecting Clients to Active Directory
Installing Active Directory Domain Services
Navigating Installation Options
Adding the Active Directory Role
Adding Domain Controllers to a Domain
Creating New Domains in New Forests
Adding a Domain or Domain Tree to a Forest
Performing an Installation from Media
Cloning Virtualized Domain Controllers
Using Clones of Virtualized Domain Controllers
Creating a Clone Virtualized Domain Controller
Finalizing the Clone Deployment
Troubleshooting the Clone Deployment
Uninstalling Active Directory
Working with Organizational Units
Using OUs for Delegation
Using OUs for Group Policy
Creating an OU Design
Using a Division or Business Unit Model
Using a Geographic Model
Using a Cost Center Model
Using an Administration Model
Creating and Managing Organizational Units
Creating an OU
Setting OU Properties
Adding Accounts and Resources to an OU
Delegating Administration of Domains and OUs
Understanding Delegation of Administration
Delegating Administration
Read-Only Domain Controllers: The Essentials
RODC Features
RODC Placement
Installing RODCs
Preparing for an RODC Installation
Installing an RODC
Installing an RODC from Media
Staging an RODC
Managing Password Replication Policy
Understanding Password Replication Policy
Controlling Password Replication
Managing Credentials on an RODC
Verifying Account Access Status
Resetting Credentials
Delegating Administrative Permissions
Operations Master Roles: The Essentials
Establishing Operations Masters
Identifying Operations Masters
Positioning Operations Masters
Working with Schema Masters
Locating the Schema Master
Transferring the Schema Master Role
Working with Domain Naming Masters
Locating the Domain Naming Master
Transferring the Domain Naming Master Role
Working with Relative ID Masters
Understanding RIDs
Managing RID Availability
Locating the RID Master
Transferring the RID Master Role
Working with PDC Emulators
How the PDC Emulator Manages Time Services
Locating the PDC Emulator
Transferring the PDC Emulator Role
Working with Infrastructure Masters
Locating the Infrastructure Master
Transferring the Infrastructure Master
Forcing Operations Master Role Transfers
Preparing to Seize a FSMO Role
Seizing a FSMO Role
Active Directory Sites: The Fundamentals
Expanding Your Site Plan
Replication Within and Between Sites
Determining Site Boundaries
Understanding Active Directory Replication
Tracking Replication Changes Over Time
Tracking System Volume Changes Over Time
Replication Architecture: An Overview
Intersite Replication Essentials
Replication Rings and Directory Partitions
Developing or Revising Your Site Design
Mapping Network Infrastructure
Mapping Network Structure to Site Structure
Designing the Individual Sites
Designing the Intersite Replication Topology
Considering the Impact of Site-Link Bridging
Planning the Placement of Servers within Sites
Managing Sites and Subnets
Creating a Site
Creating a Subnet
Managing Domain Controllers within Sites
Managing Site Links and Intersite Replication
Navigating Replication Transport Options
Creating a Site Link
Configuring Replication Schedules for Site Links
Configuring Site-Link Bridges
Determining the ISTG
Configuring Site Bridgehead Servers
Configuring Advanced Site-Link Options
Monitoring and Troubleshooting Replication
Using the Replication Administrator
Using PowerShell to Monitor and Troubleshoot Replication
Using Performance Monitor to Track Replication
Modifying Intersite Replication for Testing
Group Policy Fundamentals
Local vs Directory-based Group Policy
Group Policy Settings
Group Policy Architecture
Administrative Templates
Administration Tools
Using Local Group Policy
Configuring Directory-based Policy
Getting Domain Information
Accessing Forests, Domains, and Sites for Management
Creating and Linking a New GPO
Editing a GPO
Linking to a GPO
Working with Starter GPOs
Deleting a GPO
Using the Default GPOs
Managing Group Policy Through Delegation
Assigning GPO Creation Rights
Reviewing Management Privileges
Delegating Management Privileges
Delegating Privileges for Links and RSoP
Managing Group Policy Inheritance
Understanding Policy Application
Changing Link Order and Precedence
Overriding Inheritance
Blocking Inheritance
Enforcing Inheritance
Filtering Group Policy Application
Managing Policy Processing
Modifying Policy Processing
Configuring Loopback Processing
Using Scripts in Group Policy
Configuring Computer Scripts
Configuring User Scripts
Applying Group Policy Through Security Templates
Working with Security Templates
Applying Security Templates
Maintaining and Troubleshooting Group Policy
Understanding Group Policy Refresh
Modifying Group Policy Refresh
Viewing Applicable GPOs and the Last Refresh
Modeling GPOs for Planning
Refreshing Group Policy Manually
Backing Up GPOs
Restoring GPOs
Fixing Default Group Policy
← Prev
Back
Next →
← Prev
Back
Next →